, to see if you have full access to this publication.
Book Titles Partial access

The Abolishment of the Right to Privacy?

The USA, Mass Surveillance and the Spiral Model
Authors:
Publisher:
 05.02.2018

Summary

This book aims to explain the US violation of the human right to privacy unveiled by Edward Snowden with a newly developed comprehensive spiral model. After analyzing the social and juridical roots of the norm of privacy, it portrays the countering of privacy by the security norm in the US public debate and the US policy from the 1930s to 2013. On the basis of this case study the author refines the spiral model invented by Risse et al. Finally, the book explores the reaction of several actors following the Snowden disclosures and analyzes the tools these actors have used to influence the behavior of the USA. Thereby the author examines if the US reactions to the Snowden disclosures since 2013 follow the heuristic approach of the spiral model.



Bibliographic data

Copyright year
2018
Publication date
05.02.2018
ISBN-Print
978-3-8288-4034-8
ISBN-Online
978-3-8288-6750-5
Publisher
Tectum, Baden-Baden
Series
Tectum - Masterarbeiten
Language
German
Pages
162
Product type
Book Titles

Table of contents

ChapterPages
  1. Titelei/Inhaltsverzeichnis Partial access Pages I - VIII Download chapter (PDF)
  2. 1. Introduction No access Pages 1 - 6
  3. 2. The Spiral Model No access Pages 7 - 12
    1. 3.1. Privacy as Social Norm No access
    2. 3.2. Privacy as Juridical Norm No access
    3. 3.3. Privacy as International Norm No access
    4. 3.4. Cultural Differences: the USA and the EU No access
    1. 4.1. Surveillance, Security and Privacy No access
    2. 4.2. From Roosevelt to the Church Committee No access
    3. 4.3. From Reagan to 9/11 No access
    4. 4.4. After 9/11 No access
    5. 4.5. Foreign Surveillance No access
    6. 4.6. The USA and a Comprehensive Spiral Model No access
    1. 5.1. Liberal states No access
      1. 5.2.1. United Nations No access
      2. 5.2.2. European Union No access
      3. 5.2.3. Council of Europe No access
    2. 5.3. (International) Non-Governmental Organizations: Amnesty International No access
  4. 6. The US Response: Does the Spiral Model Work? No access Pages 129 - 136
  5. 7. Conclusion: Privacy – a Dead Norm? No access Pages 137 - 142
  6. Bibliography No access Pages 143 - 162

Bibliography (249 entries)

  1. Bibliography Open Google Scholar
  2. Abu-Laban, Yasmeen (2014): The politics of surveillance. Civil liberties, human rights and ethics, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 420�427. Open Google Scholar
  3. Adler, David Gray (2008): George Bush, the unitary executive and the Constitution, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 99�119. Open Google Scholar
  4. Agamben, Giorgio (2015): Die Geburt des Sicherheitsstaats, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 7�9. Open Google Scholar
  5. Aid, Mattew (2009): The Secret Sentry. The Untold History of the National Security Agency, New York: Bloomsbury Press. Open Google Scholar
  6. Aiken, Katherine (2008): Senator Church and his constituents, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 76�95. Open Google Scholar
  7. Altmann, Irwin (1977): Privacy Regulation: Culturally Universal or Culturally Specific?, in: Journal of Social Issues, Vol. 33, No. 3, pp. 66�84. Open Google Scholar
  8. American Civil Liberties Union (2015): ACLU V. Clapper � Challenge to NSA Mass Call-Tracking Program, available at: https://www.aclu.org/cases/aclu-v-clapper-challenge-nsa-mass-call-tracking-program [accessed: 05/25/2016]. Open Google Scholar
  9. American Civil Liberties Union (2001): In Defence of Freedom in a Time of Crisis, available at: https://www.aclu.org/defense-freedom-time-crisis [accessed: 04/19/16]. Open Google Scholar
  10. American Civil Liberties Union (n.d.): Court battles, available at: https://www.aclu.org/defending-our-rights/court-battles?topics=132 [accessed: 05/25/2016]. Open Google Scholar
  11. Amnesty International (2016a): Amnesty International Report 2015/16. The State of the World�s Human Rights, available at: https://www.amnesty.org/en/latest/research/2016/02/annual-report-201516/ [accessed: 05/25/2016]. Open Google Scholar
  12. Amnesty International (2016b): Amnesty International State of the World 2015�2016, available at: http://www.amnestyusa.org/research/reports/amnesty-international-state-of-the-world-2015-2016?page=show [accessed: 05/25/2016]. Open Google Scholar
  13. Amnesty International (2015a): Global opposition to USA big brother mass surveillance, 03/18/2015, available at: https://www.amnesty.org/en/latest/news/2015/03/global-opposition-to-usa-big-brother-mass-surveillance/ [accessed: 05/34/2016]. Open Google Scholar
  14. Amnesty International (2015b): Global Surveillance Operations and the Risk to Human Rights, 06/06/2015, available at: http://www.amnestyusa.org/pdfs/AIUSA_GlobalSurveillanceBoardLetter_20150606.pdf [accessed: 05/24/2016]. Open Google Scholar
  15. Amnesty International (2015c): Amnesty International Report 2014/15. The State of the World�s Human Rights, available at: https://www.amnesty.org/en/latest/research/2016/02/annual-report-201516/ [accessed: 05/25/2016]. Open Google Scholar
  16. Amnesty International (2014): New tool for spy victims to detect government surveillance, 11/20/2014, available at: https://www.amnesty.org/en/latest/news/2014/11/new-tool-spy-victims-detect-government-surveillance/ [accessed: 05/24/2016]. Open Google Scholar
  17. Amnesty International (2013): The US NSA and the UK GCHQ want to listen in on all: Time for the Human Rights Council to discuss their activities: Amnesty International written statement to the 24th session of the UN Human RightsCouncil (9 to 27 September 2013), 08/29/2013, AI index: IOR 41/018/2013. Open Google Scholar
  18. Amnesty International (n.d.a): Stand Up For Our Rights Online!, available at: http://act.amnestyusa.org/ea-action/action?ea.client.id=1839&ea.campaign.id=36747 [accessed: 05/24/2016]. Open Google Scholar
  19. Amnesty International (n.d.b): Does your country share your data with the USA?, available at: https://www.amnesty.org/en/latest/campaigns/2015/06/does-your-country-share-your-data-with-the-usa/ [accessed: 05/24/2016]. Open Google Scholar
  20. Amnesty International (n.d.c): Human Rights and National Security, available at: http://www.amnestyusa.org/our-work/issues/security-and-human-rights [accessed: 05/25/2016]. Open Google Scholar
  21. Amnesty International (n.d.d): Suchbegriffe, available at: http://www.amnesty.de/suche?words-advanced=Folter&search.x=0&search.y=0&search=Suchen&country=&topic=&node_type=ai_journal_story&from_month=6&from_year=2013&to_month=4&to_year=2016&sort_type=desc&page_limit=10&form_id=ai_search_form#resultlist [accessed: 05/25/2016]. Open Google Scholar
  22. Amnesty International (n.d.e): Brosch�ren, available at: https://www.amnesty.de/2010/9/26/broschueren?destination=node%2F16659 [accessed: 05/25/2016] Open Google Scholar
  23. Amnesty Internaional et al. (n.d.): Reset the net, available at: https://www.resetthenet.org [accessed: 05/24/2016]. Open Google Scholar
  24. Amnesty International/Privacy International (2015): Two years after Snowden, available at: https://www.amnesty.org/en/documents/act30/1795/2015/en/ [accessed: 05/25/2016]. Open Google Scholar
  25. Ashby, LeRoy (2008): The Church Committee�s history and relevance. Reflecting on Senator Church, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 57�75. Open Google Scholar
  26. Atkinson, L. Rush (2015): Regulating the Surveillance State, Upstream and Down: A Law & Economics Approach to the Intelligence Framework and Proposed Reforms, in: Stanford Journal of International Law, Vol. 51, No.1, pp. 1�18. Open Google Scholar
  27. Bamford, James (2009): The Shadow Factory. The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, New York: Anchor Books. Open Google Scholar
  28. Beaumont, Ben (2015a): Edward Snowden: �I should have come forward sooner,� 06/04/2015, available at: https://www.amnesty.org/en/latest/campaigns/2015/06/edward-snowden-i-should-have-come-forward-sooner/ [accessed: 05/24/2016]. Open Google Scholar
  29. Beaumont, Ben (2015b): 7 reasons why �I�ve got nothing to hide� is the wrong response to mass surveillance, 04/29/2015, available at: https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong-response-to-mass-surveillance/ [accessed: 05/24/2016]. Open Google Scholar
  30. Beck, Ulrich (1986): Risikogesellschaft. Auf dem Weg in eine andere Moderne, Frankfurt a.M.: Suhrkamp Open Google Scholar
  31. Bedan, Matt (2007): Echelon�s Effect: The Obsolescence of the US Foreign Intelligence Legal Regime, in: Federal Communications Law Journal, Vol. 59, No. 2, pp. 425�444. Open Google Scholar
  32. Bennett, Colin (2014): Privacy advocates, privacy advocacy and the surveillance society, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 412�419. Open Google Scholar
  33. Bennett, Colin (2011): Storming the Barricades so We Can All Be Private Together: Everyday Surveillance and the Politics of Privacy Advocacy, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: Springer VS Verlag, pp. 299�320. Open Google Scholar
  34. Bennett, Colin (1992): Regulating Privacy. Data Protection and Public Policy in Europe and the United States, Ithaca: Cornell University Press. Open Google Scholar
  35. Biermann, Kai (2017a): Was der NSA-Ausschuss erreicht hat und was nicht, in: Zeit online, 06/28/2017, available at: http://www.zeit.de/politik/deutschland/2017-06/ueberwachungsaffaere-nsa-untersuchungsausschuss-abschlussbericht-faq/komplettansicht [accessed: 09/05/2017]. Open Google Scholar
  36. Biermann, Kai (2017b): Opposition wirft Regierung L�ge vor, in: Zeit online, 06/19/2017, available at: http://www.zeit.de/politik/deutschland/2017-06/nsa-untersuchungsausschuss-bnd-abschlussbericht-opposition [accessed: 09/05/2017]. Open Google Scholar
  37. Biermann, Kai (2017c): Selbstherrliche �berwachung soll Gesetz werden, in: Zeit online, 06/07/2017, available at: http://www.zeit.de/politik/deutschland/2016-06/nsa-bnd-verfassungsschutz-ueberwachung-gesetz-entwurf/komplettansicht [accessed: 09/05/2017]. Open Google Scholar
  38. Blum, Stephanie Cooper (2009): What Really is at Stake with the FISA Amendments Act of 2008 and Ideas for Future Surveillance Reform, in: Boston University Public Interest Law Journal, Vol. 2, pp. 269�314. Open Google Scholar
  39. Bogart, William (2014): Simulation and post-panopticism, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 30�37. Open Google Scholar
  40. Boghosian, Heidi (2013): Spying on Democracy. Government Surveillance, Corporate Power, and Public Resistance, San Francisco: City Lights Books. Open Google Scholar
  41. Brivot, Marion/Yves Gendron (2011): Beyond panopticism: On the ramifications of surveillance in a contemporary professional setting, in: Accounting, Organizations and Society, Vol. 36, No. 3, pp. 135�155. Open Google Scholar
  42. Brown, Ian/Morton Halperin/Ben Hayes et al. (2017): Toward Multilateral Standards for Foreign Surveillance Reform, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 461�491. Open Google Scholar
  43. Brown, Ian (2013): Anforderung an die Erm�chtigung zur rechtm��igen Abh�rung, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckedahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 206�213. Open Google Scholar
  44. Buckley, John (2014): Managing Intelligence. A Guide to Law Enforcement Professionals, Boca Raton: CRC Press. Open Google Scholar
  45. Bunz, Mercedes: Vom Speicher zum Verteiler. Die Geschichte des Internet, Berlin: Kadmos. Open Google Scholar
  46. Bygrave, Lee A. (2010): Privacy and Data Protection in an International Perspective, in: Scandinavian Studies in Law, Vol. 56, pp. 165�200. Open Google Scholar
  47. Cate, Fred H. (2015): Edward Snowden and the NSA: Law, Policy, and Politics, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 26�44. Open Google Scholar
  48. Ceyhan, Ayse (2014): Surveillance as biopower, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 38�45. Open Google Scholar
  49. Chaos Computer Club (n.d.): Chaos Computer Club, available at: https://www.ccc.de/en/home [accessed: 01/20/2016]. Open Google Scholar
  50. Chesterman, Simon (2011): One Nation Under Surveillance. A New Social Contract to Defend Freedom Without Sacrificing Liberty, Oxford: Oxford University Press. Open Google Scholar
  51. Chinese National Ministry of Defense (2014): Statement on U.S. Indictment of Chinese Military Officers, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, p. 165. Open Google Scholar
  52. Christie, George (1972): Government Surveillance and Individual Freedom: A Proposed Statutory Response to Laird vs. Tatum and the Broader Problem of Government Surveillance of the Individual, in: New York University Law Review, Vol. 47, pp. 871�902. Open Google Scholar
  53. Clarke, Roger (1988): Information Technology and Dataveillance, in: Communications of the Association for Computing Machinery, Vol. 31, No. 5, pp. 498�512. Open Google Scholar
  54. Cohn, Cindy/Rainey Reitman (2015): USA Freedom Act Passes: What We Celebrate, What We Mourn, and Where We Go From Here, 06/02/2015, available at: https://www.eff.org/deeplinks/2015/05/usa-freedom-act-passes-what-we-celebrate-what-we-mourn-and-where-we-go-here [accessed: 05/29/2016]. Open Google Scholar
  55. Cole, David (2003): The new McCathyism: Repeating History in the War on Terrorism, in: Harvard Civil Rights-Civil Liberties Law Journal, Vol. 38, No. 1, pp. 1�30. Open Google Scholar
  56. Commissioner of Human Rights (2016): Memorandum on surveillance and oversight mechanisms in the United Kingdom, 05/16/2016, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2919538&SecMode=1&DocId=2375752&Usage=2 [accessed: 05/23/2016]. Open Google Scholar
  57. Commissioner of Human Rights (2015): Democratic and effective oversight of national security services, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2796355&SecMode=1&DocId=2286978&Usage=2 [accessed: 05/23/2016]. Open Google Scholar
  58. Commissioner of Human Rights (2014): The rule of law on the Internet and in the wider digital world, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2734552&SecMode=1&DocId=2262340&Usage=2 [accessed: 05/23/2016]. Open Google Scholar
  59. Commissioner of Human Rights (2008): Protecting the Right to Privacy in the Fight Against Terrorism, available at: https://wcd.coe.int/com.instranet.InstraServlet?Index=no&command=com.instranet.CmdBlobGet&InstranetImage=1416463&SecMode=1&DocId=1426260&Usage=2 [accessed: 05/23/2016]. Open Google Scholar
  60. Connolly, Kate (2015): German secret service BND reduces cooperation with NSA, in: The Guardian, 05/07/2015, available at: http://www.theguardian.com/world/2015/may/07/german-secret-service-bnd-restricts-cooperation-nsa-us-online-surveillance-spy [accessed: 05/14/2016]. Open Google Scholar
  61. Conyers, John (2009): Reining in the Imperial Presidency. Lessons and Recommendations Relating to the Presidency of George W. Bush. House Committee on the Judiciary Majority Staff Report to Chairman John C. Conyers, Jr., New York: Skyhorse Publishing. Open Google Scholar
  62. Cope, Sophia (2016): House Advances Email Privacy Act, Setting the Stage for Vital Privacy Reform, 04/27/2016, available at: https://www.eff.org/deeplinks/2016/04/house-advances-email-privacy-act-setting-stage-vital-privacy-reform [accessed: 05/29/2016]. Open Google Scholar
  63. Council of Europe (2016a): Recommendation CM/Rec(2016)5[1] of the Committee of Ministers to member States on Internet freedom, 04/13/2016, available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=09000016806415fa [accessed: 05/23/2016]. Open Google Scholar
  64. Council of Europe (2016b): Internet Governance � Council of Europe Strategy 2016�2019. Democracy, human rights and the rule of law in the digital world, 03/30/2016, available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=09000016805c1b60 [accessed: 05/23/2016]. Open Google Scholar
  65. Council of Europe (2015a): Mass surveillance, Resolution 2045, 04/21/2015, available at: http://assembly.coe.int/nw/xml/XRef/Xref-XML2HTML-en.asp?fileid=21692&lang=en [accessed: 05/23/2016]. Open Google Scholar
  66. Council of Europe (2015b): Improving the protection of whistleblowers, Resolution 2060, 06/23/2015, available at: http://semantic-pace.net/tools/pdf.aspx?doc=aHR0cDovL2Fzc2VtYmx5LmNvZS5pbnQvbncveG1sL1hSZWYvWDJILURXLWV4dHIuYXNwP2ZpbGVpZD0yMTkzMSZsYW5nPUVO&xsl=aHR0cDovL3NlbWFudGljcGFjZS5uZXQvWHNsdC9QZGYvWFJlZi1XRC1BVC1YTUwyUERGLnhzbA==&xsltparams=ZmlsZWlkPTIxOTMx [accessed: 05/23/2015] Open Google Scholar
  67. Council of Europe (2013a): Council of Europe alerts governments on risks of digital tracking and surveillance, 06/12/2013, available at: https://go.coe.int/phA5g [accessed: 05/23/2016]. Open Google Scholar
  68. Council of Europe (2013b): Council of Europe ministerial conference calls for effective safeguards against electronic mass surveillance, 11/08/2013, available at: https://go.coe.int/bjrvF [accessed: 05/23/2016]. Open Google Scholar
  69. Council of Europe (2001): Additional Protocol to the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data regarding supervisory authorities and transborder data flows, available at: http://www.coe.int/de/web/conventions/full-list/-/conventions/rms/0900001680080626 [accessed: 01/20/2016]. Open Google Scholar
  70. Council of Europe (1981): Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, available at: http://www.coe.int/de/web/conventions/full-list/-/conventions/rms/0900001680078b37 [accessed: 01/19/2016]. Open Google Scholar
  71. Council of Europe (n.d.a): European Convention on Human Rights, available at: http://www.echr.coe.int/Documents/Convention_ENG.pdf [accessed: 01/19/2016]. Open Google Scholar
  72. Council of Europe (n.d.b): Ad Hoc Committee on Data Protection (CAHDATA), available at: http://www.coe.int/t/dghl/standardsetting/dataprotection/Cahdata_en.asp [accessed: 05/23/2016]. Open Google Scholar
  73. Council of Europe (n.d.c): United States � Observer, available at: http://www.coe.int/en/web/portal/united-states [accessed: 05/23/2016]. Open Google Scholar
  74. Cullather, Nick (2015): Security and Liberty: The Imaginary Balance, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 19�25. Open Google Scholar
  75. Daase, Christopher/Tim Nicholas R�hlig (2016): Der Wandel der Sicherheitskultur nach 9/11, in: Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und (immer) neue Sicherheitsma�nahmen?, Susanne Fischer/Carlo Masala (eds.), Wiesbaden: Springer VS Verlag, pp. 13�34. Open Google Scholar
  76. Der Spiegel (1971): EDV im Odenwald, No. 20, p. 88, available at: http://www.spiegel.de/spiegel/print/d-43176393.html [accessed: 01/26/2016]. Open Google Scholar
  77. Deutscher Bundestag (2017): Beschlussfassung und Bericht des 1. Untersuchungsausschusses nach Artikel 44 des Grundgesetzes, Vorabfassung, 06/23/2017, Drucksache 18/12850, available at: http://dip21.bundestag.de/dip21/btd/18/128/1812850.pdf [accessed: 09/05/2017]. Open Google Scholar
  78. Diffie, Whitfield/Susan Landau (2007): Privacy on the Line. The Politics of Wiretapping and Encryption, Massachusetts: MIT Press. Open Google Scholar
  79. Doherty, Thomas (2003): Cold War, Cool Medium. Television, McCarthyism, and American Culture, New York: Columbia University Press. Open Google Scholar
  80. Dycus, Stephen (2008): Domestic military intelligence activities, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 163�183. Open Google Scholar
  81. Electronic Frontier Foundation (n.d.a): About EFF, available at: https://www.eff.org/about [accessed: 02/20/2015]. Open Google Scholar
  82. Electronic Frontier Foundation (n.d.b): Timeline of NSA Domestic Spying, available at: https://www.eff.org/nsa-spying/timeline [accessed: 05/04/2016]. Open Google Scholar
  83. Electronic Frontier Foundation (n.d.c): All EFF�s legal cases, available at: https://www.eff.org/cases [accessed: 05/25/2016]. Open Google Scholar
  84. Electronic Privacy Information Center (n.d.): About EPIC, available at: https://epic.org/epic/about.html [accessed: 02/20/2015]. Open Google Scholar
  85. Elliff, John (1984): Attorney General�s Guidelines for FBI Investigations, in: Cornell Law Review, Vol. 69, No. 4, pp. 785�815. Open Google Scholar
  86. Elmer, Greg (2014): Panopticon � discipline � control, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 21�29. Open Google Scholar
  87. Enn�ckl, Daniel (2014): Der Schutz der Privatsph�re in der elektronischen Datenverarbeitung, Wien: Verlag �sterreich. Open Google Scholar
  88. European Data Protection Supervisor (2016): EDPS starts work on a New Digital Ethics, 01/26/2016, Press Release No. EPDS/2016/05, available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2016/EDPS-2016-05-EDPS_Ethics_Advisory_Group_EN.pdf [accessed: 05/20/2016]. Open Google Scholar
  89. European Data Protection Supervisor (n.d.): Ethics Advisory Group, available at: https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/Ethics [accessed: 05/20/2016]. Open Google Scholar
  90. European Parliament (2014): European Parliament resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens� fundamental rights and on transatlantic cooperation in Justice and Home Affairs, 03/12/2014, EU Doc. P7_TA(2014)0230, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+TA+P7-TA-2014-0230+0+DOC+PDF+V0//EN [accessed: 05/19/2016]. Open Google Scholar
  91. European Parliament (2013): European Parliament resolution of 4 July 2013 on the US National Security Agency surveillance programme, surveillance bodies in various Member States and their impact on EU citizens� privacy, 07/04/2013, EU Doc. P7_TA(2013)0322, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+TA+P7-TA-2013-0322+0+DOC+PDF+V0//EN [accessed: 05/19/2016]. Open Google Scholar
  92. European Parliament (2001): Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system), 07/11/2001, EU Doc. A5-0264/2001, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A5-2001-0264+0+DOC+XML+V0//EN#_part5_def3 [accessed: 04/29/2016]. Open Google Scholar
  93. European Union (2016): Directive 2016/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA, in: Official Journal of the European Union, L 119, 05/04/2016, pp. 0089�0131, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L0680&rid=2 [accessed: 05/19/2016]. Open Google Scholar
  94. European Union (2012): Charter of Fundamental Rights of the European Union, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT [accessed: 01/21/2016]. Open Google Scholar
  95. European Union (1995): Directive 95/46/EC of the European Parliament and of the Open Google Scholar
  96. Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, in: Official Journal of the European Union, L 281, 11/23/1995, pp. 0031�0050, available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML [accessed: 01/19/2016]. Open Google Scholar
  97. Fidler, David (ed.) (2015a): The Snowden Reader, Bloomington: Indiana University Press. Open Google Scholar
  98. Fidler, David (2015b): U.S. Foreign Policy and the Snowden Leaks, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 52�69. Open Google Scholar
  99. Finnemore, Martha/Kathryn Sikkink (1998): International Norm Dynamics and Political Change, in: International Organization, Vol. 53, No. 4, pp. 887�917. Open Google Scholar
  100. Foerstel, Herbert (2008): The Patriot Act. A Documentary and Reference Guide, Westport: Greenwood Press. Open Google Scholar
  101. Forsythe, David (2002): The United States and International Criminal Justice, in: Human Rights Quarterly, Vol. 24, No. 4, pp. 974�991. Open Google Scholar
  102. Gamson, William/David Meyer (1996): Framing Political Opportunity, in: Comparative Perspectives on Social Movements: Political Opportunities, Mobilizing Structures, and Cultural Framings, Dough McAdam et al. (eds.), Cambridge: Cambridge University Press, pp. 275�290. Open Google Scholar
  103. Garstka, Hansj�rgen (2003): Informationelle Selbstbestimmung und Datenschutz. Das Recht auf Privatsph�re, in: B�rgerrechte im Netz, Christiane Schulzki-Haddouti (ed.), pp. 48�70. Open Google Scholar
  104. Gathmann, Florian (2013): Eklat um Evo Morales: Pr�sidentenjet verl�sst Wien nach Zw�lf-Stunden-Stopp, in: Spiegel Online, 07/03/2013, available at: http://www.spiegel.de/politik/ausland/morales-flugzeug-in-wien-gestoppt-snowden-nicht-an-bord-a-909146.html [accessed: 05/28/2016]. Open Google Scholar
  105. Gebauer, Matthias et al. (2013): Berlin Leaves Biggest NSA Questions Unanswered, in: Spiegel Online, 07/29/2013, available at: http://www.spiegel.de/international/world/german-government-responds-to-nsa-spying-and-data-collection-leaks-a-913635.html [accessed: 05/16/2016]. Open Google Scholar
  106. Gellman, Barton (2013): U.S. surveillance architecture includes collection of revealing Internet, phone metadata, in: The Washington Post, 06/16/2013, available at: https://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_print.html [accessed: 05/04/2016]. Open Google Scholar
  107. Gellman, Barton/Laura Poitras (2013): U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, in: The Washington Post, 06/07/2013, available at: https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1 [accessed: 04/28/2016]. Open Google Scholar
  108. Gibbs, Samuel (2016): Data regulators reject EU-US Privacy Shield safe harbour deal, in: The Guardian, 04/14/2016, available at: https://www.theguardian.com/technology/2016/apr/14/data-regulators-reject-eu-us-privacy-shield-safe-harbour-deal [accessed: 05/19/2016]. Open Google Scholar
  109. Gibbs, Samuel (2015): What is �safe harbour� and why did the EUCJ just declare it invalid?, in: The Guardian, 10/06/2015, available at: https://www.theguardian.com/technology/2015/oct/06/safe-harbour-european-court-declare-invalid-data-protection [accessed: 05/19/2016]. Open Google Scholar
  110. Gill, Peter (2015): World Society under Surveillance, in: Global Trends: Prospects for World Society, Stiftung Entwicklung und Frieden (ed.), pp. 71�86. Open Google Scholar
  111. Gilliom, John/Torin Monahan (2014): Everyday resistance, in: Routledge Handbook of Surveillance Studies, Kristie Ball et. al. (ed.), Abingdon: Routledge, pp. 405�411. Open Google Scholar
  112. Giugni, Marco (2009): Political Opportunities: From Tilly to Tilly, in: Swiss Political Science Review, Vol. 15, No. 2, pp. 361�368. Open Google Scholar
  113. Glancy, Dorothy (1979): The Invention of the Right to Privacy, in: Arizona Law Review, Vol. 21, No. 1, pp. 1�39. Open Google Scholar
  114. Glendon, Mary Ann (2002): A World Made New. Eleanor Roosevelt and the Universal Declaration of Human Rights, New York: Random House. Open Google Scholar
  115. Global Privacy Enforcement Network (n.d.): Action Plan for the Global Privacy Enforcement Network (GPEN), available at: https://www.privacyenforcement.net/about_the_network#action_plan [accessed: 01/20/2016]. Open Google Scholar
  116. Goos, Kerstin et al. (2015): The co-evolution of surveillance technologies and surveillance practices, in: Surveillance in Europe, David Wright/Reinhard Kreissl (ed.), New York: Routledge, pp. 51�100. Open Google Scholar
  117. Gorman, Siobhan/Evan Perez/Janet Hook (2013): U.S. Collects Vast Data Trove, in: The Wall Street Journal, 06/07/2013, available at: http://www.wsj.com/articles/SB10001424127887324299104578529112289298922 [accessed: 04/27/2016]. Open Google Scholar
  118. Greenberg, Andy (2017): Passing the Email Privacy Act Has Never Been More Urgent, in: Wired, 02/06/2017, available at: https://www.wired.com/2017/02/trump-power-email-privacy-act-never-urgent/ [accessed: 09/06/2017]. Open Google Scholar
  119. Greenberg, Andy (2014): These Are the Emails Snowden Sent to First Introduce His Epic NSA Leaks, in: Wired, 10/13/2014, available at: https://www.wired.com/2014/10/snowdens-first-emails-to-poitras/ [accessed: 05/28/2016]. Open Google Scholar
  120. Greenberg, Andy (2013): Watch Top US Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year, in: Forbes, 06/06/2013, available at: http://www.forbes.com/sites/andygreenberg/2013/06/06/watch-top-u-s-intelligence-officials-repeatedly-deny-nsa-spying-on-americans-over-the-last-year-videos/#6c8b4e1021d3 [accessed: 04/27/2016]. Open Google Scholar
  121. Greenberg, Ivan (2010): The Dangers of Dissent. The FBI and Civil Liberties since 1965, New York: Lexington. Open Google Scholar
  122. Greenlee, Michael (2008): National security letters and intelligence oversight, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 184�204. Open Google Scholar
  123. Greenwald, Glenn (2013a): NSA collecting phone records of millions of Verizon customers daily, in: The Guardian, 06/06/2013, available at: http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order [accessed: 04/27/2016]. Open Google Scholar
  124. Greenwald, Glenn (2013b): NSA collected US email records in bulk for more than two years under Obama, in: The Guardian, 06/27/2013, available at: http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama [accessed: 04/28/2016]. Open Google Scholar
  125. Greenwald, Glenn/Spancer Ackerman (2013): Now the NSA is still harvesting your online data, in: The Guardian, 06/27/2013, available at: http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection [accessed: 05/04/2016]. Open Google Scholar
  126. Haas, Michael (2014): International Human Rights. A Comprehensive Introduction, New York: Routledge. Open Google Scholar
  127. Hager, Nicky (2015): Wie die NSA in die Welt kam, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 10�17. Open Google Scholar
  128. Haggerty, Kevin/Richard Ericson (2000): The surveillant assemblage, in: British Journal of Sociology, Vol. 51, No. 4, pp. 605�622. Open Google Scholar
  129. Harper, Nick (2014): FISA�s Fuzzy Line between Domestic and International Terrorism, in: The University of Chicago Law Review, Vol. 81, No. 3, pp. 1123-1164. Open Google Scholar
  130. Harris, Shane (2010): The Watchers. The Rise of America�s Surveillance State, New York: Penguin Press. Open Google Scholar
  131. Hart, Gary (2008): Liberty and security, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 13�21. Open Google Scholar
  132. Hegemann, Hendrik/Martin Kahl (2016): Konstruktionen und Vorstellungen von Wirksamkeit in der Antiterror-Politik: Eine kritische Betrachtung, in: Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und (immer) neue Sicherheitsma�nahmen?, Susanne Fischer/Carlo Masala (eds.), Wiesbaden: Springer VS Verlag, pp. 189�207. Open Google Scholar
  133. Hei�ler, Julian (2017): Ein bisschen Aussp�hen unter Freunden, in: tagesschau.de, 10/21/2017, available at: https://www.tagesschau.de/inland/bnd-gesetz-reform-103.html [accessed: 09/05/2017]. Open Google Scholar
  134. Heller, Regina/Martin Kahl/Daniela Pisoiu (2012): The �dark� side of normative argumentation � The case of counterterrorism policy, in: Global Constitutionalism, Vol. 1, No. 2, pp. 278�312. Open Google Scholar
  135. Hempel, Leon/Susanne Krasmann/Ulrich B�ckling (2011): Sichtbarkeitsregime: Eine Einleitung, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 7�24. Open Google Scholar
  136. Holt, Jennifer/Steven Malcic (2015): The Privacy Ecosystem. Regulating Digital Identity in the United States and European Union, in: Journal of Information Policy, Vol. 5, pp. 155�178. Open Google Scholar
  137. Horowitz, Sarah (2017): Foucault�s Panopticon. A Model for NSA Surveillance?, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 39�62. Open Google Scholar
  138. Jansen, Jonas (2015): So k�nnen Sie nachpr�fen, ob Sie ausgesp�ht wurden, in: Frankfurter Allgemeine Zeitung, 02/19/2015, available at: http://www.faz.net/aktuell/feuilleton/debatten/privacy-international-zeigt-ueberwachung-durch-gchq-13437376.html [accessed: 02/20/2015]. Open Google Scholar
  139. Johnson, Brittany May (2016): Foreign National�s Privacy Interests Under U.S. Foreign Intelligence Law, in: Texas International Law Journal, Vol. 51, No. 2, pp. 229�257. Open Google Scholar
  140. Johnson, Loch (2008): Establishment of modern intelligence accountability, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 37�56. Open Google Scholar
  141. Kammerer, Dietmar (2015): Absolut unamerikanisch. Die schleichende Enteignung der Privatsph�re in den USA, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 28�32. Open Google Scholar
  142. Katzenstein, Peter (1996): The Culture of National Security. Norms and Identity in World Politics, New York: Columbia University Press. Open Google Scholar
  143. Keck, Margaret/Kathryn Sikkink (1998): Activists beyond Borders. Advocacy Networks in International Politics, Ithaca: Cornell University Press. Open Google Scholar
  144. Kerr, Orin (2001): The Fourth Amendment in Cyberspace: Can Encryption Create a �Reasonable Expectation to Privacy?�, in: Connecticut Law Review, Vol. 33, No. 503, pp. 503�533. Open Google Scholar
  145. Kietz, Daniela/Johannes Thimm (2013): Zwischen �berwachung und Aufkl�rung. Die amerikanische Debatte und die europ�ische Reaktion auf die Praxis der NSA, SWP-Aktuell, No. 51. Open Google Scholar
  146. Kittlitz, Alard von (2010): Der Traum von einem idealen Leben, in: Frankfurter Allgemeine Zeitung, 08/06/2010, available at: http://www.faz.net/aktuell/feuilleton/debatten/digitales-denken/ende-der-privatsphaere-der-traum-von-einem-idealen-leben-11026194.html [accessed: 06/09/2016]. Open Google Scholar
  147. Krasmann, Susanne (2011): Der Pr�ventionsstaat im Einvernehmen. Wie Sichtbarkeitsregime stillschweigend Akzeptanz produzieren, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 53�70. Open Google Scholar
  148. Krieger, Wolfgang (2014): Geschichte der Geheimdienste. Von den Pharaonen bis zur NSA, M�nchen: C.H. Beck. Open Google Scholar
  149. Kurz, Constanze (2016): Wir erkl�ren den Cyber War f�r er�ffnet, in: Frankfurter Allgemeine Zeitung, 03/07/16, available at: http://www.faz.net/aktuell/feuilleton/aus-dem-maschinenraum/amerika-erklaert-dem-is-den-ersten-cyberwar-14109024.html [accessed: 04/18/16]. Open Google Scholar
  150. Lee, Newton (2015): Counterterrorism and Cybersecurity. Total Information Awareness, Heidelberg: Springer. Open Google Scholar
  151. Liese, Andrea (2009): Exceptional Necessity. How Liberal Democracies Contest the Prohibition of Torture and Ill-Treatment when Countering Terrorism, in: Journal of International Law and International Relations, Vol. 5, No. 1, pp. 17�47. Open Google Scholar
  152. Liptak, Adam (2013): Justices Turn Back Challenge to Broader US Eavesdropping, in: The New York Times, 02/26/2013, available at: http://www.nytimes.com/2013/02/27/us/politics/supreme-court-rejects-challenge-to-fisa-surveillance-law.html?_r=0 [accessed: 05/24/2016]. Open Google Scholar
  153. Lynch, Andrew/Nicola McGarrity/George Williams (2010): The emergence of a �culture of control,� in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 3�9. Open Google Scholar
  154. Lyon, David (2015): Surveillance after Snowden, Cambridge: Polity. Lyon, David/Kevin Haggerty/Kristie Ball (2014): Introducing surveillance studies, Open Google Scholar
  155. in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 1�11. Open Google Scholar
  156. MacAskill, Ewen (2015): The NSA�s bulk metadata collection authority just expired. What now?, in: The Guardian, 11/28/2015, available at: http://www.theguardian.com/us-news/2015/nov/28/nsa-bulk-metadata-collection-expires-usa-freedom-act [accessed: 05/29/2016]. Open Google Scholar
  157. Mason, Alpheus Thomas (1946): Brandeis. A free man�s life, New York: Viking Press. Open Google Scholar
  158. McCullagh, Declan (2006): FBI taps cell phone mic as eavesdropping tool, available at: http://www.cnet.com/news/fbi-taps-cell-phone-mic-as-eavesdropping-tool/ [accessed: 04/16/16]. Open Google Scholar
  159. McCulloch, Jude/Sharon Pickering (2010): Counter-terrorism. The law and policing of pre-emption, in: in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 13�29. Open Google Scholar
  160. McGarrity, Nicola/George Williams (2010): When extraordinary measures become normal. Pre-emption in counter-terrorism and other laws, in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 131�149. Open Google Scholar
  161. McKeown, Ryder (2009): Norm Regress: US Revisionism and the Slow Death of the Torture Norm, in: International Relations, Vol. 23, No. 1, pp. 5�25. Open Google Scholar
  162. Meister, Andre (2013): Vorratsdatenspeicherung: Warum Verbindungsdaten noch aussagekr�ftiger sind als Kommunikationsinhalte, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 229�233. Open Google Scholar
  163. Miller, Russel (2017): A Rose by any Other Name? The Comparative Law of the NSA-Affair, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 63�94. Open Google Scholar
  164. Mills, Jon L. (2015): The Future of Privacy in the Surveillance Age, in: After Snowden. Privacy, Secrecy, and Security in the Information Age, Ronald Goldfarb (ed.), New York: St. Martin�s Press, pp. 191�260. Open Google Scholar
  165. Moechel, Erich (2013): Was Metadaten der NSA verraten, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 241�244. Open Google Scholar
  166. Montgomery, Bruce (2008): The Bush-Cheney Administration�s Assault on Open Government, Westport: Praeger. Open Google Scholar
  167. Mui�nieks, Nils (2015): Europe is spying on you, in: The New York Times, 10/27/2015, available at: http://www.nytimes.com/2015/10/28/opinion/europe-is-spying-on-you-mass-surveillance.html?_r=0 [accessed: 05/23/2015]. Open Google Scholar
  168. Mui�nieks, Nils (2013): Prism: secret surveillance could destroy democracy rather than defend it, in: The Guardian, 06/26/2013, available at: http://www.coe.int/en/web/commissioner/-/prism-secret-surveillance-could-destroy-democracy-rather-than-defend-it [accessed: 05/23/2016]. Open Google Scholar
  169. Nakashima, Ellen/Jobby Warrick (2013): For NSA chief, terrorist threat drives passion to �collect it all�, in: The Washington Post, 07/14/2013, available at: https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html [accessed: 06/08/2016]. Open Google Scholar
  170. Newell, Jim (2013): Thousands gather in Washington for anti-NSA �Stop Watching Us� rally, in: The Guardian, 10/26/2013, available at: http://www.theguardian.com/world/2013/oct/26/nsa-rally-stop-watching-washington-snowden [accessed: 06/08/2016]. Open Google Scholar
  171. Nielsen, Richard/Beth Simmons (2015): Rewards for Ratification: Payoffs for Participating in the International Human Rights Regime?, in: International Studies Quarterly, Vol. 59, No. 2, pp. 197�208. Open Google Scholar
  172. Nissenbaum, Helen (2010): Privacy in Context. Technology, Policy, and the Integrity of Social Life, Stanford: Stanford University Press. Open Google Scholar
  173. Nyst, Carly/Tomaso Falchetta (2017): The Right to Privacy in the Digital Age, in: Journal of Human Rights Practice, Vol. 9, No. 1, pp. 104�118. Open Google Scholar
  174. Obama, Barack (2014): Remarks on Review of Signals Intelligence, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 318�330. Open Google Scholar
  175. O�Connel, Mary Ellen (2012): Cyber Security without Cyber War, in: Journal of Conflict and Security Law, Vol. 17, No. 2, pp. 187�209. Open Google Scholar
  176. On the Issue (n.d.): George W. Bush on Technology, available at: http://www.ontheissues.org/Celeb/George_W__Bush_Infrastructure.htm [accessed: 05/03/2016]. Open Google Scholar
  177. Opitz, Sven/Ute Tellmann (2011): Katastrophale Szenarien: Gegenw�rtige Zukunft in �konomie und Recht, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 27�52. Open Google Scholar
  178. Organization for Economic Co-Operation and Development (2013): The OECD Privacy Framework, available at: http://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf [accessed: 01/20/2016]. Open Google Scholar
  179. Organization for Economic Co-Operation and Development (1997): Recommendation of the Council concerning guidelines for cryptography policy, available at: http://www.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=C(97)62/FINAL&docLanguage=En [accessed: 01/20/2016]. Open Google Scholar
  180. Organization for Economic Co-Operation and Development (1980): OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, available at: http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm [accessed: 01/18/2016]. Open Google Scholar
  181. Panke, Diana/Ulrich Petersohn (2016): Norm challenges and norm death: The inexplicable?, in: Cooperation and Conflict, Vol. 51, No. 1, pp. 3�19. Open Google Scholar
  182. Peters, Anne (2017): Privacy, Rechtsstaatlichkeit, and the Legal Limits on Extraterritorial Surveillance, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 145�179. Open Google Scholar
  183. P�schl, Magdalena (2015): Sicherung grund- und menschenrechtlicher Standards gegen�ber neuen Gef�hrdungen durch private und ausl�ndische Akteure, in: �ffnung der �ffentlich-rechtlichen Methode durch Internationalit�t und Interdisziplinarit�t: Erscheinungsformen, Chancen, Grenzen ; Referate und Diskussionen auf der Tagung der Vereinigung der Deutschen Staatsrechtslehrer in D�sseldorf vom 1. bis 4. Oktober 2014, Hans Christian R�hl et al. (eds.), Berlin: de Gruyter, pp. 405�452. Open Google Scholar
  184. Prosser, William (1960): Privacy, in: California Law Review, Vol. 48, No. 3, pp. 383�423. Open Google Scholar
  185. Reagan, Priscilla M. (2014): Regulating surveillance technologies. Institutional arrangements, in: Routledge Handbook of Surveillance Studies, Kristie Ball et. al. (ed.), Abingdon: Routledge, pp. 397-404. Open Google Scholar
  186. Rebinger, Simon (2017): Datensch�tzer r�tseln: Schafft Trump Datenschutz-Abkommen zwischen USA und EU ab?, 01/27/2017, available at: https://netzpolitik.org/2017/datenschuetzer-raetseln-schafft-trump-datenschutz-abkommen-zwischen-usa-und-eu-ab/ [accessed: 09/07/2017]. Open Google Scholar
  187. Reilly, Mollie (2013): Obama Defends NSA Surveillance Program, Says It�s �Transparent,� in: The Huffington Post, 06/18/2013, available at: http://www.huffingtonpost.com/2013/06/17/obama-nsa-surveillance_n_3455771.html [accessed: 05/28/2016]. Open Google Scholar
  188. Restore the Fourth (2015): Who we are, 12/05/2015, available at: https://restorethe4th.com/who-we-are/ [accessed: 06/08/2016]. Open Google Scholar
  189. Risen, James (2013): Snowden Says He Took No Secret Files to Russia, in: The New York Times, 10/17/2013, available at: http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-to-russia.html?_r=0&mtrref=undefined&gwh=8BB37884F4339E8D704EFD583EF66B2E&gwt=pay [accessed: 05/28/2016]. Open Google Scholar
  190. Risen, James/Eric Lichtblau (2005): Bush Lets US Spy on Callers Without Courts, in: The New York Times, 12/16/2005, available at: http://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.html [accessed: 05/04/2016]. Open Google Scholar
  191. Risse, Thomas et al. (eds.) (2013): The Persistent Power of Human Rights. From Commitment to Compliance, New York: Cambridge University Press. Open Google Scholar
  192. Risse, Thomas et al. (eds.) (1999): The Power of Human Rights. International Norms and Domestic Change, New York: Cambridge University Press. Open Google Scholar
  193. R�ssler, Beate (2001): Der Wert des Privaten, Frankfurt a.M.: Suhrkamp. Open Google Scholar
  194. Roth, Anna-Lena/Florian Gathmann (2013): Merkel zur Handy-Aff�re: �Aussp�hen unter Freunden � das geht gar nicht�, in: Spiegel Online, 10/24/2013, available at: http://www.spiegel.de/politik/deutschland/handy-spaehaffaere-um-merkel-regierung-ueberprueft-alle-nsa-erklaerungen-a-929843.html [accessed: 05/20/2016]. Open Google Scholar
  195. Rouseff, Dilma (2013): Statement to United Nations General Assembly, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 158�159. Open Google Scholar
  196. Rudl, Thomas (2016): EU-US-Datenschutzschild: Irische Datensch�tzer reichen Nichtigkeitsklage ein, 10/27/2016, available at: https://netzpolitik.org/2016/eu-us-datenschutzschild-irische-datenschuetzer-reichen-nichtigkeitsklage-ein/ [accessed: 09/07/2017]. Open Google Scholar
  197. Rudl, Thomas (2015): Snowden-Dokumente best�tigen Echelon-Programm: R�ckschau auf 40 Jahre Aufdeckungsarbeit, 08/06/2015, available at: https://netzpolitik.org/2015/snowden-dokumente-bestaetigen-echelon-programm-rueckschau-auf-40-jahre-aufdeckungsarbeit/ [accessed: 04/29/2016]. Open Google Scholar
  198. Ruhmann, Ingo (2014): NSA, IT-Sicherheit und die Folgen, in: Datenschutz und Datensicherheit, No. 1/2014, pp. 40�46. Open Google Scholar
  199. Rule, James (2014): �Needs� for surveillance and the movement to privacy, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 64�71. Open Google Scholar
  200. Sales, Allice (2015): Brazil Shows How Not to Respond to Snowden Revelations, in: Panam Post, 02/24/2015, available at: https://panampost.com/alice-salles/2015/02/24/brazil-shows-how-not-to-respond-to-snowden-revelations/ [accessed: 05/15/2016]. Open Google Scholar
  201. Schaar, Peter (2013): Welche Konsequenzen haben PRISM und Tempora f�r den Datenschutz in Deutschland und Europa?, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 118�127. Open Google Scholar
  202. Schariatmadari, David (2015): Privacy is starting to seem like a very 20th-century anomaly, in: The Guardian, 11/07/2015, available at: http://www.theguardian.com/commentisfree/2015/nov/07/privacy-seems-20th-century-aberration-but-worth-mourning [accessed: 01/26/2016]. Open Google Scholar
  203. Scheer, Ursula (2015): Haben die Amerikaner den Deutschen gedroht?, in: Frankfurter Allgemeine Zeitung, 03/20/2015, available at: http://www.faz.net/aktuell/feuilleton/medien/geheimdienste-und-snowden-gabriel-verraet-greenwald-ein-geheimnis-13496416.html [accessed: 05/28/2016]. Open Google Scholar
  204. Schiedermair, Stephanie (2012): Der Schutz des Privaten als internationales Grundrecht, T�bingen: Mohr Siebeck. Open Google Scholar
  205. Schmale, Wolfgang/Marie-Theres Tinnefeld (2014): Privatheit im digitalen Zeitalter, Wien: B�hlau. Open Google Scholar
  206. Schneider, Jens-Peter (2017): Developments in European Data Protection Law in the Shadow of the NSA-Affair, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 539�563. Open Google Scholar
  207. Schrecker, Ellen (2002): The Age of McCarthyism. A Brief History with Documents, New York: Bedford/St. Martin�s. Open Google Scholar
  208. Schrecker, Ellen (1998): Many are the Crimes. McCarthyism in America, Princeton: Princeton University Press. Open Google Scholar
  209. Schwartz, Paul (2013): The EU-U.S. Privacy Collision: A Turn to Institutions and Procedures, in: Harvard Law Review, Vol. 126, pp. 1967�2009. Open Google Scholar
  210. Schwarz, Frederick (2008): The Church Committee, then and now, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 22�36. Open Google Scholar
  211. Schweidler, Walter (2014): Der gute Staat. Politische Ethik von Platon bis zur Gegenwart, Wiesbaden: Springer VS. Open Google Scholar
  212. Scott, Mark (2016): U.S. and Europe in �Safe Harbor� Data Deal, but Legal Fight May Await, in: The New York Times, 02/02/2016, available at: http://www.nytimes.com/2016/02/03/technology/us-europe-safe-harbor-data-deal.html?_r=0 [accessed: 05/19/2016]. Open Google Scholar
  213. Shance, Scott (2013): No Morsel Too Minuscule for All-Consuming N.S.A., in: The New York Times, 11/02/2013, available at: http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?pagewanted=1&_r=1 [accessed: 05/20/2016]. Open Google Scholar
  214. Shapiro, Ari (2013): How Obama's Response To NSA Spying Has Evolved, in: NPR, 11/13/2013, available at: http://www.npr.org/sections/itsallpolitics/2013/11/13/245037300/how-obamas-response-to-nsa-spying-has-evolved [accessed: 05/28/2016]. Open Google Scholar
  215. Sikkink, Kathryn (2013): The United States and torture: does the spiral model work?, in: The Persistent Power of Human Rights. From Commitment to Compliance, Thomas Risse et al. (eds.), New York: Cambridge University Press, pp. 145�163. Open Google Scholar
  216. Smale, Alison (2015): Germany, Too, Is Accused of Spying on Friends, in: The New York Times, 05/05/2015, available at: http://www.nytimes.com/2015/05/06/world/europe/scandal-over-spying-shakes-german-government.html?_r=0 [accessed: 05/16/2016]. Open Google Scholar
  217. Solove, Daniel/Paul Schwartz (2009): Privacy, Information and Technology, New York: Wolters Kluwer. Open Google Scholar
  218. Solove, Daniel (2008): Understanding privacy, Cambridge: Harvard University Press. Open Google Scholar
  219. Solove, Daniel (2002): Conceptualizing Privacy, in: California Law Review, Vol. 90, No.4, pp. 1087�1155. Open Google Scholar
  220. Sprenger, Florian (2015): Politik der Mikroentscheidungen: Edward Snowden, Netzneutralit�t und die Architektur des Internets, L�neburg: meson press. Open Google Scholar
  221. Stratford, Jean Slemmons/Juri Stratford (1998): Data Protection and Privacy in the United States and Europe, in: IASSIST Quarterly, Fall edition, pp. 17�20. Open Google Scholar
  222. Theoharis, Athan (2011): Abuse of Power. How Cold War Surveillance and Secrecy Policy Shaped the Response to 9/11, Philadelphia: Temple University Press. Open Google Scholar
  223. The White House (2014): Presidential Policy Directive � Signals Intelligence Activities. Presidential Policy Directive/PPD-28, available at: https://www.whitehouse.gov/the-press-office/2014/01/17/presidential-policy-directive-signals-intelligence-activities [accessed: 06/09/2016]. Open Google Scholar
  224. The White House (2002): President Bush Delivers Graduation Speech at West Point, available at: http://georgewbush-whitehouse.archives.gov/news/releases/2002/06/20020601-3.html [accessed: 04/28/2016]. Open Google Scholar
  225. Tilly, Charles (1978): From Mobilization to Revolution, Reading: Addison-Wesley Publishing. Open Google Scholar
  226. United Nations (n.d.): Charter of the United Nations, available at: http://www.un.org/en/sections/un-charter/chapter-i/index.html [accessed: 06/12/2016]. Open Google Scholar
  227. United Nations General Assembly (2016): Report of the Special Rapporteur on the right to privacy, UN Doc. A/71/368, distributed on 08/30/2016, available at: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/71/368 [accessed: 09/05/2017]. Open Google Scholar
  228. United Nations General Assembly (2014): Promotion and protection of human rights and fundamental freedoms while countering terrorism. Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, UN Doc. A/69/397, distributed on 09/23/2014, available at: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/69/397 [accessed: 05/17/2016]. Open Google Scholar
  229. United Nations General Assembly (2013): Resolution 68/167, The Right to Privacy in the Digital Age, 13/18/2013, UN Doc. A/RES/68/167, distributed on 01/21/2014, available at: http://www.un.org/ga/search/view_doc.asp?symbol=A/RES/68/167 [accessed: 05/17/2016]. Open Google Scholar
  230. United Nations General Assembly (1998): Official Records, Fifty-third session, 7th plenary meeting, 11/211998, UN Doc. A/53/PV.7, available at: http://www.un.org/documents/a53pv7.pdf [accessed: 06/13/2016]. Open Google Scholar
  231. United Nations General Assembly (1968): Resolution 2450 (XXIII). Human rights and scientific and technological developments, available at: https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/244/10/IMG/NR024410.pdf?OpenElement [accessed: 01/17/2016]. Open Google Scholar
  232. United Nations Human Rights Council (2016): Report of the Special Rapporteur on the right to privacy, Joseph A. Cannataci, Advanced Unedited Version, UN Doc. A/HRC/31/64, distributed on 03/08/2016, available at: http://www.ohchr.org/EN/Issues/Privacy/SR/Pages/SRPrivacyIndex.aspx [accessed: 05/17/2016]. Open Google Scholar
  233. United Nations Human Rights Council (2014a): The right to privacy in the digital age. Report of the Office of the United Nations High Commissioner for Human Rights, UN Doc. A/HRC/27/37, distributed on 06/30/2014, available at: http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx [accessed: 05/17/2016]. Open Google Scholar
  234. United Nations Human Rights Council (2014b): Concluding observations on the fourth periodic report of the United States of America, 04/23/2014, UN Doc. CCPR/C/USA/CO/4, available at: http://www.refworld.org/docid/5374afcd4.html [accessed: 05/18/2016]. Open Google Scholar
  235. United States Government Publishing Office (2001): Uniting and strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001, available at: https://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf [accessed: 04/19/16]. Open Google Scholar
  236. Van Schaack, Beth (2014): The United States� Position on the Extraterritorial Application of Human Rights Obligations: Now is the Time for Change, in: International Law Studies, Vol. 90, pp. 20�65. Open Google Scholar
  237. V�eneky, Silja (2017): Espionage, Security Interests, and Human Rights in the Second Machine Age. NSA Mass Surveillance and the Framework of Public International Law, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 492�507. Open Google Scholar
  238. Walen, Alec (2017): Forth Amendment Rights for Nonresident Aliens, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 282�303. Open Google Scholar
  239. Warren, Samuel/Louis Brandeis (1890): The Right to Privacy, in: Harvard Law Review, Vol. 4, No. 5, pp. 193�220. Open Google Scholar
  240. Weadon, Patrick D. (2009): Sigsaly Story, available at: https://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/sigsaly_story.shtml [Accessed: 01/14/2016]. Open Google Scholar
  241. Weisselberg, Charles (2010): Constitutional criminal procedure and civil rights in the shadow of the �war on terror.� A look at recent United States decisions and the rhetoric of terrorism, in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 71�87. Open Google Scholar
  242. Westin, Alan (1970): Privacy and Freedom, New York: Ahteneum. Open Google Scholar
  243. Wiener, Antje (2014): A Theory of Contestation, Heidelberg: Springer. Open Google Scholar
  244. Winterfeld, Steve/Jason Andress (2013): The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and Practice, New York: Elsevier. Open Google Scholar
  245. Wheeler, Brian (2004): �This goes no further��, in: BBC news, 03/02/04, available at: http://news.bbc.co.uk/2/hi/uk_news/magazine/3522137.stm [accessed: 04/19/16]. Open Google Scholar
  246. Wright, David/Reinhard Kreissl (2015): European responses to the Snowden revelations, in: Surveillance in Europe, David Wright/Reinhard Kreissl (eds.), London: Routledge, pp. 6�50. Open Google Scholar
  247. Zedner, Lucia (2009): Security, New York: Routledge. Open Google Scholar
  248. Zengerle, Patricia (2013): U.S. lawmakers want sanctions on any country taking in Snowden, in: Reuters, 07/25/2013, available at: http://www.reuters.com/article/us-usa-security-congress-idUSBRE96O18220130725 [accessed: 05/28/2016]. Open Google Scholar
  249. Zurawski, Nils (2015): Technische Innovationen und deren gesellschaftliche Auswirkungen im Kontext von �berwachung, Schriftenreihe Sicherheit, Nr. 16, Jochen Schiller et al. (eds.), Berlin: Forschungsforum �ffentliche Sicherheit. Open Google Scholar

Similar publications

from the topics "Government & Governance & Administration", "Comparative Political Research & Country Studies", "International Relations"
Cover of book: Die politische Rechte in Lateinamerika
Edited Book Full access
Nadja Ahmad, Hans-Jürgen Burchardt, Kristina Dietz, Hannes Warnecke-Berger, Jonas Wolff
Die politische Rechte in Lateinamerika
Cover of book: Weltbilder und Weltordnung
Educational Book No access
Gert Krell, Peter Schlotter, Alexandra Homolar, Frank A. Stengel
Weltbilder und Weltordnung
Cover of book: Arenen des Diskurses
Edited Book No access
Thomas Schölderle, Laura Martena
Arenen des Diskurses
Cover of book: Europa
Book Titles No access
Hans Jörg Schrötter
Europa